Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 44
- History 15
- RELIGION 14
- Crítica e interpretación 10
- Gestión de la producción 10
- Novela norteamericana 9
- Política y gobierno 9
- Biblia 8
- Historia militar 8
- Social aspects 8
- Video games 8
- Bíblia 7
- Literatura anglesa 7
- Management 7
- Producción 7
- Relaciones 7
- Ellwood, Craig 6
- Novela inglesa 6
- Politics and government 6
- Religion 6
- Artificial intelligence 5
- Bible 5
- Computer networks 5
- Conducta humana 5
- Cristianismo 5
- Gran Bretaña 5
- Iglesia Católica 5
- Arquitectura 4
- Christianity 4
- Computer security 4
-
601
-
602Publicado 2024Tabla de Contenidos: “…Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning -- Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations -- Model hijacking -- Trojan horse code injection -- Model reprogramming -- Summary -- Chapter 6: Supply Chain Attacks and Adversarial AI -- Traditional supply chain risks and AI -- Risks from outdated and vulnerable components -- Risks from AI's dependency on live data -- Securing AI from vulnerable components -- Enhanced security - allow approved-only packages -- Client configuration for private PyPI repositories -- Additional private PyPI security -- Use of SBOMs -- AI supply chain risks -- The double-edged sword of transfer learning -- Model poisoning -- Model tampering -- Secure model provenance and governance for pre-trained models -- MLOps and private model repositories -- Data poisoning -- Using data poisoning to affect sentiment analysis -- Defenses and mitigations -- AI/ML SBOMs -- Summary…”
Libro electrónico -
603
-
604
-
605por OECDTabla de Contenidos: “…Active labour market policies -- The changed environment: Challenges facing the public employment services -- Spending on active labour market policies further increased in 2021, but to a lesser extent than in 2020 -- Re-orientation of public employment services strategies and operating models, including via greater digitalisation -- Adapting the design and mode of delivery of active labour market policies to support an inclusive recovery -- Post-COVID-19 priorities for active labour market policies and public employment services -- Spotlights on specific policies for women, young people, frontline workers and racial/ethnic minorities -- Spotlight 1: Labour market and social policies to support women during the COVID-19 crisis -- Unpaid work increased during the pandemic, especially for women -- Working from home can be a double-edged sword for women -- Women entrepreneurs under strain -- Victims of domestic violence more exposed to their abusers -- Spotlight 2: Protecting young people from scarring effects and economic hardship -- Supporting young labour market entrants -- Reaching out to the "hidden NEETs" -- Providing income support to students affected by job loss…”
Publicado 2022
Libro electrónico -
606
-
607
-
608
-
609
-
610
-
611
-
612Publicado 2016Tabla de Contenidos: “…-- Writing Subroutines -- Try It Out 10-1 -- Subroutine Input and Output -- Try It Out 10-2 -- Nesting Subroutines -- Try It Out 10-3 -- Create a Dragon Game -- Step 1: Open the Startup File -- Step 2: Write the SetUp() Subroutine -- Step 3: Add a Bit of Chance -- Step 4: Let the Player Know What's Going On -- Step 5: Get the Player in the Game with GetChoice() -- Step 6: Process the Player's Choice -- Step 7: Add Motion with MoveKnight() -- Step 8: Shoot Arrows with ShootArrow() -- Step 9: Swing the Sword with StabDragon() -- Step 10: Breathe Fire -- Try It Out 10-4 -- Programming Challenges -- Chapter 11: Event-Driven Programming -- GraphicsWindow Events -- Create Patterns with the MouseDown Event -- Try It Out 11-1 -- Fire Missiles with the KeyDown Event -- Try It Out 11-2 -- Make a Typewriter Using the TextInput Event -- Try It Out 11-3 -- Draw Pictures with the MouseMove Event -- Try It Out 11-4 -- Useful Tips -- Create a Gold Rush Game -- Step 1: Open the Startup File…”
Libro electrónico -
613
-
614
-
615
-
616Publicado 2020“…See full details at: microsoft.com/learn Practice Files Available at: MicrosoftPressStore.com/MOSWordExpert101/downloads…”
Libro electrónico -
617Publicado 2020“…See full details at: microsoft.com/learn Practice Files Available at: MicrosoftPressStore.com/MOSWord100/Downloads…”
Libro electrónico -
618
-
619Publicado 2020“…Fires will be kindled to testify that two and two make four. Swords will be drawn to prove that leaves are green in summer. …”
991006053519706719 -
620